Request a Demo

Your Name

Your Email

Telephone Number

Company Name

Industry

Believe in Security? We Do.

As a matter of fact that is all we think about – Secure File Share

These days, when it comes to safe, secure file transfer, you can’t be too careful. That’s why we created ICFiles, an encrypted communication system aka Soc 2 secure file sharing or secure file share desktop app. Our advanced technology delivers unrivaled end-to-end security covering all the access points to and from any virtual or physical location. Simply put, ICFiles provides customers with the confidence that can’t be obtained using email, FTP or any other avenues used to share files.

But there’s more – Secure File Sharing

Even better, we believe in server thinning and free bandwidth, which means content delivery is decidedly faster.

History of Encryption

For CPAs

Time to Discover Your Italian Roots– Accounting as we know it was born during the Italian renaissance. Seemingly mundane, the birth of double entry bookkeeping was actually a revolutionary event in the financial world. This new method of bookkeeping allowed merchants and bankers to better determine their profits and elevated commerce to new heights…

For Lawyers

Without Secure Encryption, Heads Will Roll– After Mary, Queen of Scots, stepped down from her throne in Scotland in 1567, the Babington Plot was hatched by her cousin, Queen Elizabeth. This plot would frame Mary for conspiring to kill Protestant Queen Elizabeth and reclaim England’s throne under the guise of making England a Catholic nation once again…

For Investment Advisors

It’s No Secret That Security is Job #1– Hundreds, if not thousands of orders of secret societies have existed over time. Many Europeans participated in these societies during the 1700s, from skilled workers to nobility. This prompted European governments and the Catholic Church to act because they looked down upon secret societies…

For EA / Tax Professionals

It’s a Battle Out There– America unofficially became involved in World War II when the Japanese signaled their imperial march by attacking American military bases in Guam, the Philippines and Pearl Harbor on December 7, 1941. Meanwhile, France succumbed to the Nazi blitzkrieg invasion and Britain weathered Hitler’s nightly bombing campaign…

For Architects / Engineers

In Business, it’s a Battlefield – Leading up to World War II, Poles found their country increasingly insecure. Between Germany and Russia, its potential foes, Poland’s intelligence service focused on breaking Germany’s radio broadcasts to assess possible threats. However, Poland needed to figure out how to decipher the encrypted radio…

For Construction / General Contractors

Lay a Safe, Secure Foundation– In 2003, Steven Klinsky and Maureen Sherry, seasoned stock market whizzes, purchased an apartment for well above $8 million dollars. Located in the moneyed section of Manhattan, between 50th Street and 60th Street, their newly purchased apartment was formerly owned by E.F. Hutton and Marjorie Merriweather Post…

For Government Agencies

Learn How to Safeguard Your Documents Like the Infamous– In 1919, at only 22 years old, Al Capone came to Chicago to help Johnny Torrio run his bootlegging operation. Capone was originally only called in to help deal with the competition, but in 1925 Torrio fled the city allowing Capone to take over. The Hawthorne Inn in Cicero, with its bulletproof shutters…

For Medical Professionals

Still Unbreakable After All These Years– 500 years later, the Voynich Manuscript is one of Europe’s most puzzling encrypted documents. Penned in the late 1400s or the early 1500s, it contains encrypted passages and unexplained sketches. Named in honor of Wilfrid M. Voynich’s when he acquired it in 1912, it’s been referred to as a written historical enigma…

For Everyone

We’ve Come a Long Way– Advances in cryptography make today’s Secure File Share nearly impossible to access by outsiders. But let’s look at where we started. Cryptography in the form of codes, ciphers, invisible ink, and hidden messages were used as a form of data encryption by both sides during the Revolutionary war, including many Loyalists who spied for Britain…

For CPAs

Time to Discover Your Italian Roots– Accounting as we know it was born during the Italian renaissance. Seemingly mundane, the birth of double entry bookkeeping was actually a revolutionary event in the financial world. This new method of bookkeeping allowed merchants and bankers to better determine their profits and elevated commerce to new heights…

Don't have an account? Sign up Below

Newsletter

Stay in touch with the latest news

Twitter Feed

Real News from Real People

And I was very clear in telling the two Secret Service Agents my GOD FEARING WIFE isn't a rich, wealthy, known, famous celebrity like @KimKardashian, and I'm certainly not @kanyewest, because I didn't rap about selling my soul to the devil, but at least it came with a Happy Meal!